Skip to content

    Security How-To

    Security How-To
    9 min read | February 1, 2024

    Incident Response for State and Local Governments

    Read More
    Security How-To
    7 min read | January 24, 2024

    The steps municipalities can take to prepare for rising cyberattacks

    Read More
    Security How-To
    3 min read | January 23, 2024

    Revolutionizing Government Cybersecurity: Ottawa County’s Journey with Blumira

    Read More
    Security How-To
    17 min read | January 22, 2024

    4 Unexpected Ways to Strengthen State and Local Government Cybersecurity

    Read More
    Security How-To
    13 min read | January 9, 2024

    How to Identify and Prevent Phishing in Businesses

    Read More
    Security How-To
    4 min read | December 19, 2023

    Cybersecurity Detection and Protection—No Matter How You Say it

    Read More
    Security How-To
    9 min read | December 15, 2023

    How to Get Cybersecurity Buy-in from Executive Leadership

    Read More
    Security How-To
    9 min read | December 12, 2023

    How Manufacturing Companies Can Prevent Cyber-Attacks

    Read More
    Security How-To
    11 min read | November 20, 2023

    Blumira’s SMB Cybersecurity Checklist

    Read More
    Security How-To
    14 min read | November 15, 2023

    ESG: Strategies for Supercharging Security Teams

    Read More
    Security How-To
    8 min read | November 7, 2023

    Correlating GeoIP Lookups

    Read More
    Security How-To
    13 min read | October 30, 2023

    Incident Response Strategies for Ransomware

    Read More
    Security How-To
    10 min read | October 27, 2023

    Building Effective Incident Response Procedures

    Read More
    Security How-To
    4 min read | June 29, 2023

    5 Tools To Make The Most Of Your Security Budget

    Read More
    Security How-To
    19 min read | June 28, 2023

    Authentication Protocols 101: NTLM, Kerberos, LDAP and RADIUS

    Read More